Amanote Research

Amanote Research

    RegisterSign In

Configurable Security Protocols for Multi-Party Data Analysis With Malicious Participants

doi 10.1109/icde.2005.37
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
B. MalinE. AiroldiS. Edoho-Eket
Publisher

IEEE


Related search

The Conceptualization of a Configurable Multi-Party Multi-Message Request-Reply Conversation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Efficient Protocols for Set Intersection and Pattern Matching With Security Against Malicious and Covert Adversaries

English

Constructing Optimistic Multi-Party Contract Signing Protocols

2012English

Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants

English

Framework for Analysis of Multi-Party Collaboration

2019English

Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching

International Journal of Computer Applications
2011English

Dynamically Configurable Security for SRAM FPGA Bitstreams

International Journal of Embedded Systems
HardwareArchitectureSoftware
2006English

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications

2016English

A Decidable Analysis of Security Protocols

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy